CVE-2026-4164

Wavlink · WL-WN578W2

Wavlink WL-WN578W2 firmware contains a command injection vulnerability in the Delete_Mac_list/SetName/GuestWifi functions, enabling remote attackers to execute arbitrary commands.

Executive summary

A critical command injection vulnerability in Wavlink WL-WN578W2 devices allows remote attackers to execute arbitrary code and fully compromise the network hardware.

Vulnerability

The flaw resides in the POST request handler for /cgi-bin/wireless.cgi, specifically affecting the Delete_Mac_list, SetName, and GuestWifi functions. Attackers can inject malicious commands through these parameters without requiring local access.

Business impact

This vulnerability leads to total device compromise, allowing attackers to monitor unencrypted traffic and redirect users to malicious sites. With a CVSS score of 9.8, the risk is Critical, as these devices often serve as the primary security barrier for small office and home networks.

Remediation

Immediate Action: Immediately install the latest firmware update provided by Wavlink to patch the vulnerable CGI components.

Proactive Monitoring: Audit the device for any unfamiliar MAC addresses in the allowed list or unauthorized Guest Wi-Fi accounts.

Compensating Controls: Implement strict firewall rules to prevent access to the router's web management interface from external networks.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

The presence of a public exploit and the Critical severity of the flaw necessitate immediate action. Update the firmware now. If an update is not available, the device should be taken offline or replaced to prevent it from becoming a bridgehead for attackers.